This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 | Exploit Third Party Advisory |
https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103 | Broken Link |
Configurations
History
No history.
Information
Published : 2021-04-18 19:15
Updated : 2022-06-28 14:11
NVD link : CVE-2021-23380
Mitre link : CVE-2021-23380
JSON object : View
Products Affected
roar-pidusage_project
- roar-pidusage
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')